A Secure E-wallet System Using Block Chain

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

BlueWallet: The Secure Bitcoin Wallet

With the increasing popularity of Bitcoin, a digital decentralized currency and payment system, the number of malicious third parties attempting to steal bitcoins has grown substantially. Attackers have stolen bitcoins worth millions of dollars from victims by using malware to gain access to the private keys stored on the victims’ computers or smart phones. In order to protect the Bitcoin priva...

متن کامل

Wallet-on-wheels - Using vehicle's identity for secure mobile money

Mobile Money is growing in the developed world while cars are becoming much smarter. Combine the two and you get cars that ‘own’ a wallet. We propose not a user-centric, but a car-centric service that enables cars to have Pre-Pay subscription accounts for car-related purchases and for linking to financial services. The solution uses advanced car communications capability and securely stored car...

متن کامل

Electronic Commerce and E-wallet

In electronic commerce, the challenges of payment transactions were initially underestimated. Business via the internet and mobile telephony has so far been dominated by the methods of payment systems in traditional business. However, in light of advances in e-commerce, traditional business models are increasingly coming up against their limits. To understand the concept of electronic commerce,...

متن کامل

On-Line E-Wallet System with Decentralized Credential Keepers

We propose a generalization of the architecture of an electronic wallet, as first developed in the seminal European research project CAFE. With this model you can leave most of the content of your electronic wallet at the security of your residential electronic keeper, while roaming with your favorite mobile terminals. Emerging mobile handsets with both short range Bluetooth and cellular GPRS c...

متن کامل

Provably Secure and E cient Block Ciphers

The security and eciency of two recently proposed block ciphers, bear and lion, both based on a hash function and a stream cipher, is discussed. Meet-in-the-middle attacks are presented which can be used to dramatically reduce the complexity of a brute-force key search on both these ciphers. A new block cipher is described which is not susceptible to meet-in-the-middle attacks, is provably secu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Scientific Research in Computer Science, Engineering and Information Technology

سال: 2021

ISSN: 2456-3307

DOI: 10.32628/cseit2173101